answersLogoWhite

0


Best Answer

I think you mean 'CISC' and 'RISC'. These refer to two ways of designing an instruction set for a computers processor or CPU. CISC is Complex Instruction Set Computer. This is how computers all used to be designed. The chip designer added an instruciton to the CPU for pretty much anything that they thought would be useful. This produced a complex chip. Early chips like Intel 8088/86 and Motorola 68000 were designed in this way.

RISC stands for Reduced Instruction Set Computer. On these chips, the instruction set is paired down to the absolute minimum needed, and complex operations are performed with multiple instructions. This simplifies the chip design and makes it easier to design a chip which runs at faster clock speeds (Mhz or GHz) and with lower power consumption. It also makes it easier for the compiler to optimise it's output, in most cases. Examples of RISCs are the ARM family and the MIPS family.

Nowadays it's difficult to put many CPUs firmly in one or the other category, because they contain elements of both philosophies.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar
More answers
User Avatar

AnswerBot

1w ago

CISK stands for Conditional Instability of the Second Kind and refers to a process in the atmosphere where destabilizing effects lead to the development of deep convection. RISK stands for Returnable Information Storage Key and refers to a physical device used for storing cryptographic keys and securing sensitive information in a computer system.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is CISK and RISK?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Information Science

What is the main difference between RISK and CISK in information technology?

RISK (Reduced Instruction Set Computing) is a CPU design strategy that simplifies instruction set architecture for faster processing, while CISK (Complex Instruction Set Computing) allows for a wider variety of instructions but may lead to slower processing speed. RISK architectures optimize performance through simpler instructions, while CISK architectures provide more flexibility but may be more complex to execute.


What is another name for substandard risk classification?

Another name for substandard risk classification is "high-risk classification". This indicates that the individual does not meet the criteria for standard risk classification due to certain health factors or lifestyle habits that increase risk.


What are the classification of risk?

Risk can be classified into strategic risk (related to business objectives), financial risk (related to financial performance), operational risk (related to daily operations), compliance risk (related to laws and regulations), and reputational risk (related to public perception).


What are the risk factors for a risk assessment concerning personal information?

Risk factors for a risk assessment concerning personal information include unauthorized access, data breaches, insecure storage, inadequate encryption, lack of employee training, and non-compliance with privacy regulations. It is important to consider these factors when analyzing the security risks associated with storing and handling personal information.


Which NIST special publication is a guide for Applying the Risk Management Framework to Federal Information Systems?

That would be NIST Special Publication 800-37, "Guide for Applying the Risk Management Framework to Federal Information Systems." It provides guidelines for applying the Risk Management Framework (RMF) for information systems in federal agencies, helping them manage and address cybersecurity risks effectively.

Related questions

When was Simonds Farsons Cisk created?

Simonds Farsons Cisk was created in 1928.


What is the main difference between RISK and CISK in information technology?

RISK (Reduced Instruction Set Computing) is a CPU design strategy that simplifies instruction set architecture for faster processing, while CISK (Complex Instruction Set Computing) allows for a wider variety of instructions but may lead to slower processing speed. RISK architectures optimize performance through simpler instructions, while CISK architectures provide more flexibility but may be more complex to execute.


What is the national drink of Malta?

Kinnie. A fizzy drink made from bitter oranges and aromatic herbs. They also have their own beer- Cisk


What are some sodas that begin with the letter K?

Kiwi Cola Kinnie is a soft drink. It is manufactured in Malta by Simonds Farsons Cisk.


How much is alcohol from Malta?

From a bar, a Carlsberg or a local Cisk Lager would cost approximately 1 Euro something. Depends on the place you're at though.


The risk management model includes risk planning risk identification risk handling and risk monitoring.?

risk planning, risk identification, risk handling, risk monitoring


What risks are banks commonly exposed to?

credit risk, interest rate risk, operational risk, liquidity risk, price risk, compliance risk, foreign exchange risk, strategic risk and reputation risk.


What are three types of business risk?

a.price risk b.diversification risk c.pure risk d.credit risk


How many types of risks in finance?

There is Micro risk and Macro risk Under Micro risk 1. Systematic risk 2.Unsystematic risk Under macro risk 1.Finance Risk 2.Market Risk 3.Credit Risk 4.Country Risk. 5.Cash Risk


What best describes the risk status if any one element of risk shrinks to zero?

There is no risk


What is the five step process risk management?

The five steps are: Identify the risk Analyse the risk Evaluate or rank the risk Treat the risk Review the risk


What are potential risk in risk management?

legislation risk and reputation risk are considered to be very potential risks in risk management.